User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 21
 Downloands 4
Block Chain for Financial Application using IOT
2022
Journal:  
Turkish Journal of Computer and Mathematics Education
Author:  
Abstract:

The Internet of Things (IoT) has become a popular computing technology paradigm. It is increasingly being utilized to facilitate human life processes through a variety of applications, including smart healthcare, smart grids, smart finance, and smart cities. Scalability, interoperability, security, and privacy, as well as trustworthiness, are all issues that IoT applications face. Blockchain solutions have recently been created to help overcome these difficulties. Therefore, this paper describes the concept of providing security for payment processing involved in IOT devices and their service usage by applying Blockchain technology. Blockchain is a secured distributed cryptographic hashing technique which maintains transaction in a transparent and unalterable format. It maintains block of chained transaction and keeps on validating old and new transaction and if old hash matched then only transaction will be consider as successfully verified. All users’ transaction will be privacy protected and this same technique applied in this project to secure payment process happen between users and company services. All data in this project saved inside Blockchain and authentication and privacy will be performed by using DSA (digital signature algorithm) and SHA hashing technique.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Journal of Computer and Mathematics Education

Journal Type :   Uluslararası

Metrics
Article : 1.706
Cite : 106
2023 Impact : 0.071
Turkish Journal of Computer and Mathematics Education